Controls that limit the flow of information. Typical examples
include mandatory access controls (MAC) used in trusted systems, router
configuration which is often used to contain data between members of an
organization to remain within the organization, and information flow
controls based on work models.